Membership Information
Membership Criteria
· Professional Organizations: Manufacturing companies, fitment centres, and non-profits actively engaged in automotive security, technology development, or investigations.
· Individual Stakeholders: Insurance companies, consultants, and practitioners with significant experience and demonstrated commitment in the automotive security sector.
Membership Onboarding
The membership of the association is to be vetted, comprising only professional organizations and individuals who are stakeholders in the automotive industry. Once vetted and accepted by AVTPS, they will be listed publicly as “Security Industry” professionals and will have access to the AVTPS installation programs, partnership, and the ongoing development /adoption of better theft prevention/investigation solutions.
A. Aftermarket Security Product/Solutions Manufacturer
- Follow links to read more
Central Registry Design (AVTPS Data System)
Core Features:
The centralized database is designed to fill several voids. It is to be a communication hub providing various information flows to specific parties… each having its own purpose and information.
It will also provide an Installation Certification document that can be provided to the customer, insurance company, etc., either in printed or electronic form.
Data Hub:
o Public Search: Consumers can check if their vehicle has an approved product installed.
o Public Search: Consumers can check the security product manufacturer for technical or warranty support. This is an essential feature for second owners who are having issues.
o Insurance Company Search: Insurance companies can verify if a vehicle has been fitted with an approved S338 theft prevention solution.
o Law Enforcement Portal: Data sharing with law enforcement with VIN-based product lookup for investigations.
o Security Product Manufacturer: At the completion of the installation, the installation registration data will be transferred to the security product manufacturer. This data will provide product/installation details and the hidden product’s placement. This information also allows them to have warranty activation, support recall notices, and future repair required technical information.
Data Flow Levels Example:
1. Aftermarket Product Manufacturer → Product registered with a unique ID.
2. Fitment Facility → Installs product → Tech logs install into AVTPS database.
3. Data accessible to:
o Public (Limited Fields and no PII Data)
o Aftermarket Product Manufacturer (Full Fields minus the QR Code locations)
o Law enforcement (Full Fields, including all installation, repair, or warranty logs)
o Insurance partners (Limited fields – A confirmation of Installation and what Fitment Centre completed the work.)
Additional Data Notification Benefits:
Removed Products:
One of the challenges we have observed in the past is the removal of a security system. No matter the reason, the database can have a feature that identifies this on the non-public data feeds.
The purpose of this notification is to alert investigators of this change and to prevent discounts from being provided for vehicles that are no longer protected.
Second Owner Support:
Suppose a vehicle has a second owner (or a third/fourth/fifth/etc) and is now in a new location thousands of miles from the installation of the security product. What is the owner to do if the security system is having a technical issue, or a random repair facility needs more information for product support? Since the standard prevents the aftermarket security company or fitment centre from applying identifying marks onto a modified vehicle, how can help be provided? The answer is in the new standard, which requires a B Pillar label to be placed on a vehicle that has been modified. Scanning, or manually looking up this B Pillar label’s search feature, through the AVTPS system, will provide support by providing the Aftermarket Product Manufacturer name and their contact details.
Alert Flags:
In the event a vehicle is stolen, the database allows for the placement of an “Alert Flag” on any data search of that vehicle. Direct contact with AVTPS is required. We are looking for a Police report or an email confirming the alert is correct, which we place on file, and the flag is created.
Additional Anti-Clone Features:
o In other jurisdictions, anti-clone labels are applied at this time. The location of these labels, including the “Hidden or Secret” QR codes, is entered into the system for future law enforcement theft investigations and vehicle verifications. The data will be restricted to law enforcement and verified vehicle insurance SIU investigators only.
Public Searches:
o If a B Pillar, or one of the QR code labels, are scanned, the aftermarket security manufacturer’s contact details appear.
o Additional flags may also be shared, like a theft alert, and it states, “There is an alert reported on this registration. Please contact local police.”
Establish AVTPS’s Documentation Requirements
The vetting of the various levels of membership changes as per their responsibilities. These documents are to be submitted to AVTPS to ensure we are dealing with verified solutions and professional programs.
A. Aftermarket Security Product Manufacturer:
o The list of products they want recognized, along with the UL performance testing completed by an AVTPS accepted testing house.
o The supporting documentation of the installation and procedures of the installation expectations.
o The Training program for their technicians
o Any other required professional documents (i.e., product insurance, etc.)
o List of their approved Fitment Centres and Trained Technicians
o AVTPS Agreement Forms
B. Fitment Centre:
o Business license
o Business insurances (Liability, etc.)
o Any additional permits or certificates to operate.
o AVTPS Agreement Forms
C. Installation technician:
o Technician License
o Criminal Background check to be free of theft, fraud, and any gang activity.
D. Other Agreements:
o Other members may need membership agreements,
How the S338 Installation Program Works:
The following assumes it is dealing with an AVTPS member in good standing.
Aftermarket Security Manufacturers have created locations and trained technicians that have successfully been accepted by AVTPS, having met the required steps and document sharing.
Each manufacturer will provide AVTPS a list of their sites and technicians with the database system, which will allow them to fit their products.
A. Registration Labels are purchased from AVTPS by the Aftermarket Security Product member who will provide labels to the Fitment Centres.
B. The Aftermarket Security Manufacturer using a security login portal will transfer the labels to the Fitment site within the database, which locks the labels for exclusive use by that Fitment site and the fitment of their brand of product by one of their trained/approved technicians.
C. The Fitment Centre will use the AVTPS registration portal to complete the process in either one or two steps… see further details below.
Fitment Centre Registration Process:
Step One:
When an installation is scheduled to occur, the Fitment Centre will initiate the registration of the security product in the AVTPS registration portal using a security login account. They will then select the product and technician from the drop-down menus and record any necessary information, such as the VIN and installation date, and then pause the registration.
Step Two:
Once the modification has been completed and the hidden location of the product has been sorted, the registration can be reopened, and the completion of the registration can occur. Upon completion, the large B Pillar can be applied to the vehicle, and the “SUBMIT” tab can be selected.
Certificate of Installation:
Once the registration is completed, a “Print Certificate” will appear.
o The Fitment Centre can now print or email this document to the vehicle owner.
o To obtain this document in the future, one option is to allow the security product manufacturer to be able to reprint this certificate within their portal to support their customers.
o In the event there is an insurance “program”, the system can share this certificate with program members.
